Mobile banking trends and hidden risks
While mobile banking apps are growing quickly in popularity, 68 percent of smartphone owners who have not yet adopted these apps are holding back due to security fears, while …
Backdoor Trojan masquerading as KLM e-ticket
As many flyers tend to book their tickets online and receive them in electronic form, it’s no wonder that malware peddlers often choose to deliver their malicious wares …
Fake debt payment notices deliver malware
Emails purportedly coming from PayPal’s Bill Me Later service have been hitting inboxes around the world, threatening to file charges against the users if they do not …
Twitter messages lead to phishing AND malware
If you have received a private message from another Twitter telling you “lol ur famous now”, have followed it to a fake Facebook page requiring you to log into …
Pinterest users targeted with fake ad-pushing app
Pinterest, the extremely popular pinboard-style social photo sharing website, has launched official apps for Android, iPad and iPhone back in April, but that hasn’t …
Darwin’s theory applies to malware
G Data’s new malware report shows a new and unexpected development in malware: the extreme growth of new malicious programs seems to be slowing down. Granted, the …
Google Go programming language used for creating destructive Trojan
When Google introduced its Go programming language in 2009, they surely didn’t hope for it to be used for writing malware but, as these things go, it was a only a matter …
Analysis of Flame C&C servers reveals more unknown malware
Since its discovery by Kaspersky Lab and CrySyS researchers back in May, the Flame malware and its C&C infrastructure are being analyzed for additional clues on who might …
Foreign journalists in China targeted with malware-laden emails
Foreign news correspondents stationed in China have recently become targets of two separate but similar malware attacks aimed at stealing information from their computers, …
The various spam campaigns leading to Blackhole
At any given time, there is a considerable number of email spam campaigns that ultimately lead users to pages hosting exploit kits – more often then not the extremely …
Android malware threats analysis
Bitdefender released its August 2012 Android malware threats report. While in August the percentage of adware-bundled apps dropped to 55.15 per cent, from July’s 77.34 …
Microsoft’s study into unsecure supply chains leads to botnet disruption
Microsoft’s Digital Crimes Unit has disrupted the functioning of yet another botnet by effecting a takedown of a domain which was also hosting over 500 different strains …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?